Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 61.872985] ================================================================== [ 61.884216] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1e8/0x398 [ 61.892059] Read of size 1 at addr cc22f400 by task kunit_try_catch/271 [ 61.898742] [ 61.900238] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 61.900299] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 61.900299] Hardware name: Generic DRA74X (Flattened Device Tree) [ 61.900329] Call trace: [ 61.900329] unwind_backtrace from show_stack+0x18/0x1c [ 61.900390] show_stack from dump_stack_lvl+0x70/0x90 [ 61.900421] dump_stack_lvl from print_report+0x158/0x528 [ 61.900451] print_report from kasan_report+0xdc/0x118 [ 61.900482] kasan_report from __kasan_check_byte+0x34/0x3c [ 61.900512] __kasan_check_byte from kmem_cache_destroy+0x24/0x1ec [ 61.900543] kmem_cache_destroy from kmem_cache_double_destroy+0x1e8/0x398 [ 61.900604] kmem_cache_double_destroy from kunit_try_run_case+0x22c/0x5a8 [ 61.900634] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.900665] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 61.900726] kthread from ret_from_fork+0x14/0x20 [ 61.900756] Exception stack(0xf258bfb0 to 0xf258bff8) [ 61.900756] bfa0: 00000000 00000000 00000000 00000000 [ 61.900787] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 61.900817] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 61.900848] [ 62.019500] Allocated by task 271: [ 62.022918] kasan_save_track+0x30/0x5c [ 62.026794] __kasan_slab_alloc+0x60/0x68 [ 62.030822] kmem_cache_alloc_noprof+0x17c/0x36c [ 62.035491] __kmem_cache_create_args+0x1c0/0x2c0 [ 62.040222] kmem_cache_double_destroy+0xc0/0x398 [ 62.044982] kunit_try_run_case+0x22c/0x5a8 [ 62.049194] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.054718] kthread+0x464/0x810 [ 62.057983] ret_from_fork+0x14/0x20 [ 62.061584] [ 62.063079] Freed by task 271: [ 62.066162] kasan_save_track+0x30/0x5c [ 62.070037] kasan_save_free_info+0x3c/0x48 [ 62.074249] __kasan_slab_free+0x40/0x50 [ 62.078186] kmem_cache_free+0x100/0x470 [ 62.082153] kobject_put+0x21c/0x678 [ 62.085754] kmem_cache_double_destroy+0x168/0x398 [ 62.090576] kunit_try_run_case+0x22c/0x5a8 [ 62.094818] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.100341] kthread+0x464/0x810 [ 62.103607] ret_from_fork+0x14/0x20 [ 62.107208] [ 62.108703] The buggy address belongs to the object at cc22f400 [ 62.108703] which belongs to the cache kmem_cache of size 132 [ 62.120513] The buggy address is located 0 bytes inside of [ 62.120513] freed 132-byte region [cc22f400, cc22f484) [ 62.131286] [ 62.132781] The buggy address belongs to the physical page: [ 62.138397] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22f [ 62.145660] flags: 0x0(zone=0) [ 62.148742] page_type: f5(slab) [ 62.151916] raw: 00000000 c7001000 00000122 00000000 00000000 80100010 f5000000 00000000 [ 62.160064] raw: 00000000 [ 62.162689] page dumped because: kasan: bad access detected [ 62.168304] [ 62.169799] Memory state around the buggy address: [ 62.174621] cc22f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.181213] cc22f380: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.187774] >cc22f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.194335] ^ [ 62.196899] cc22f480: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.203460] cc22f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.210052] ==================================================================
[ 34.392619] ================================================================== [ 34.403775] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380 [ 34.411524] Read of size 1 at addr ffff888100ac7540 by task kunit_try_catch/258 [ 34.418836] [ 34.420337] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 34.420347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.420349] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 34.420353] Call Trace: [ 34.420355] <TASK> [ 34.420357] dump_stack_lvl+0x73/0xb0 [ 34.420362] print_report+0xd1/0x650 [ 34.420366] ? __virt_addr_valid+0x1db/0x2d0 [ 34.420371] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.420374] ? kasan_complete_mode_report_info+0x64/0x200 [ 34.420379] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.420382] kasan_report+0x141/0x180 [ 34.420386] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.420391] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.420394] __kasan_check_byte+0x3d/0x50 [ 34.420399] kmem_cache_destroy+0x25/0x1d0 [ 34.420404] kmem_cache_double_destroy+0x1bf/0x380 [ 34.420407] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [ 34.420411] ? finish_task_switch.isra.0+0x153/0x700 [ 34.420416] ? __switch_to+0x5d9/0xf60 [ 34.420420] ? dequeue_task_fair+0x166/0x4e0 [ 34.420426] ? ktime_get_ts64+0x83/0x230 [ 34.420431] kunit_try_run_case+0x1a2/0x480 [ 34.420436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.420440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 34.420445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.420450] ? __kthread_parkme+0x82/0x180 [ 34.420454] ? preempt_count_sub+0x50/0x80 [ 34.420459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.420463] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.420467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.420471] kthread+0x334/0x6f0 [ 34.420475] ? trace_preempt_on+0x20/0xc0 [ 34.420480] ? __pfx_kthread+0x10/0x10 [ 34.420484] ? _raw_spin_unlock_irq+0x47/0x80 [ 34.420489] ? calculate_sigpending+0x7b/0xa0 [ 34.420493] ? __pfx_kthread+0x10/0x10 [ 34.420497] ret_from_fork+0x3e/0x80 [ 34.420501] ? __pfx_kthread+0x10/0x10 [ 34.420506] ret_from_fork_asm+0x1a/0x30 [ 34.420512] </TASK> [ 34.420513] [ 34.604192] Allocated by task 258: [ 34.607596] kasan_save_stack+0x45/0x70 [ 34.611436] kasan_save_track+0x18/0x40 [ 34.615276] kasan_save_alloc_info+0x3b/0x50 [ 34.619547] __kasan_slab_alloc+0x91/0xa0 [ 34.623561] kmem_cache_alloc_noprof+0x123/0x3f0 [ 34.628187] __kmem_cache_create_args+0x169/0x240 [ 34.632893] kmem_cache_double_destroy+0xd5/0x380 [ 34.637600] kunit_try_run_case+0x1a2/0x480 [ 34.641786] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.647186] kthread+0x334/0x6f0 [ 34.650426] ret_from_fork+0x3e/0x80 [ 34.654006] ret_from_fork_asm+0x1a/0x30 [ 34.657940] [ 34.659439] Freed by task 258: [ 34.662499] kasan_save_stack+0x45/0x70 [ 34.666336] kasan_save_track+0x18/0x40 [ 34.670177] kasan_save_free_info+0x3f/0x60 [ 34.674361] __kasan_slab_free+0x56/0x70 [ 34.678289] kmem_cache_free+0x249/0x420 [ 34.682213] slab_kmem_cache_release+0x2e/0x40 [ 34.686660] kmem_cache_release+0x16/0x20 [ 34.690702] kobject_put+0x17e/0x450 [ 34.694330] sysfs_slab_release+0x16/0x20 [ 34.698351] kmem_cache_destroy+0xf0/0x1d0 [ 34.702457] kmem_cache_double_destroy+0x14e/0x380 [ 34.707250] kunit_try_run_case+0x1a2/0x480 [ 34.711435] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.716835] kthread+0x334/0x6f0 [ 34.720069] ret_from_fork+0x3e/0x80 [ 34.723655] ret_from_fork_asm+0x1a/0x30 [ 34.727617] [ 34.729114] The buggy address belongs to the object at ffff888100ac7540 [ 34.729114] which belongs to the cache kmem_cache of size 208 [ 34.741534] The buggy address is located 0 bytes inside of [ 34.741534] freed 208-byte region [ffff888100ac7540, ffff888100ac7610) [ 34.753617] [ 34.755114] The buggy address belongs to the physical page: [ 34.760703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ac6 [ 34.768765] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.776423] flags: 0x200000000000040(head|node=0|zone=2) [ 34.781760] page_type: f5(slab) [ 34.784901] raw: 0200000000000040 ffff888100042000 dead000000000122 0000000000000000 [ 34.792647] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 34.800389] head: 0200000000000040 ffff888100042000 dead000000000122 0000000000000000 [ 34.808221] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 34.816049] head: 0200000000000001 ffffea000402b181 00000000ffffffff 00000000ffffffff [ 34.823882] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.831758] page dumped because: kasan: bad access detected [ 34.837330] [ 34.838820] Memory state around the buggy address: [ 34.843616] ffff888100ac7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.850842] ffff888100ac7480: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 34.858060] >ffff888100ac7500: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 34.865281] ^ [ 34.870592] ffff888100ac7580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.877813] ffff888100ac7600: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.885038] ==================================================================